Designing Threat Controls For Effective Security Operations